Andrew Elliot from DCMS provides an update on government initiatives to boost cybersecurity talent pipeline
Source: Infosecurity
UK Government: Lack of Skills the Number One Issue in Cybersecurity
Uncategorized
Digital Skimming is Now the Preserve of Non-Magecart Groups
Commodity kit invites new entrants into the market
Source: Infosecurity
Digital Skimming is Now the Preserve of Non-Magecart Groups
Western Allies Warn of Top Cyber-Attack Mistakes
Poor cyber-hygiene to blame for many compromises
Source: Infosecurity
Western Allies Warn of Top Cyber-Attack Mistakes
Police Warn of £15m Courier Scams
Blend of phone and face-to-face fraud targets vulnerable
Source: Infosecurity
Police Warn of £15m Courier Scams
TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft
MDR Sentinel expands TorchLight’s leading managed detection and response (MDR) services with turnkey SIEM and SOAR capabilities from Microsoft; TorchLight also announces it attains elite Microsoft Gold Partner Status
Source: DarkReading
TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft
CVE-2022-1360
The affected On-Premise cnMaestro is vulnerable to execution of code on the cnMaestro hosting server. This could allow a remote attacker to change server configuration settings.
Source: NIST
CVE-2022-1360
CVE-2022-1361
The affected On-Premise cnMaestro is vulnerable to a pre-auth data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate data about other user’s accounts and devices.
Source: NIST
CVE-2022-1361
CVE-2022-29174
countly-server is the server-side part of Countly, a product analytics solution. Prior to versions 22.03.7 and 21.11.4, a malicious actor who knows an account email address/username and full name specified in the database is capable of guessing the password reset token. The actor may use this information to reset the password and take over the account. The problem has been patched in Countly Server version 22.03.7 for servers using the new user interface and in 21.11.4 for servers using the old user interface.
Source: NIST
CVE-2022-29174
CVE-2022-1362
The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server.
Source: NIST
CVE-2022-1362
CVE-2022-29162
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec –cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container’s bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec –cap` behavior such that the additional capabilities granted to the process being executed (as specified via `–cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.
Source: NIST
CVE-2022-29162